
Sign up to save your podcasts
Or


In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.
Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.
In this episode we discuss:
What are bug bounty programs?
Who are security researchers.
Who is running the bug bounty program?
When should an organization implement a program.
More resources:
Jason Haddix - Bug Bounty Hunting Methodology v2
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
By Timothy De Block4.7
4343 ratings
In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.
Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.
In this episode we discuss:
What are bug bounty programs?
Who are security researchers.
Who is running the bug bounty program?
When should an organization implement a program.
More resources:
Jason Haddix - Bug Bounty Hunting Methodology v2
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.

372 Listeners

1,026 Listeners

8,069 Listeners